Resources

Blog

Are Password Managers Safe to Use?

Image Passwords have become a cornerstone of the Internet. These strings of letters and numbers allow us to validate access to various communities, online tools, healthcare, banking, and more. As more and more information is stored behind passwords, efforts to steal and crack them have vastly increased.  These new cyber threats led...
Blog

The 2023 Gone Phishing Tournament Results: Everything You Need to Know

The results of Fortra’s Gone Phishing Tournament are here, and they highlight the potential power and danger of phishing across the world. This global test uncovered that 1 in 10 individuals are susceptible to these attacks, which would have led to 90,000 compromised passwords if the campaign had been an actual cyber attack. This year’s tournament featured an updated email...
Demo

Ensure Compliance With Quebec's Law 25

Your one-on-one demo includes a complete overview of the: User-friendly and intuitive security awareness platform High quality content and customizable options Targeted phishing simulation by risk profile and just-in-time training Integrated gamification for increasing user participation and motivation Critical metrics and KPIs provided in the reporting dashboards   ...
Blog

Swipe Right on Cyber Security: Let’s Talk About Zodiac Signs

With Valentine’s Day upon us, our thoughts turn to love, compatibility, and cyber security. As Cupid strings his bow this Valentine’s Day, let’s explore how the stars might be influencing your approach to online security. Are you a Leo who roars against cyber threats, or a Pisces swimming through the sea of digital privacy? Remember, while the universe might hold many...
Datasheet

Phishing Training for Microsoft 365 E5 Customers

Terranova Security’s phishing training content topics include (but are not limited to): Information Security Awareness Topics Business email compromise Email Identity Theft Introduction to information Security Malware Phishing Ransomware Social Engineering Microlearning Library Business email compromised (BEC) C-Level Email Impersonation Handling Unidentified...
Datasheet

Upgrade Security Awareness with Microsoft 365 and Terranova Security

Diverse Training for Global Teams Offering courses in major languages, extending a total of 40+, to meet the diverse needs of global workforces, ensuring consistent security practices across all regions. Metrics That Matter Use the Security Awareness Index to pinpoint your high-risk users and clearly define your cybersecurity training outcomes with measurable, data-driven...
Blog

What is Quishing?

QR codes have come a long way since being invented in 1994 by a subsidiary of Toyota. Initially introduced to address some limitations of barcodes during the car manufacturing process, QR codes have since become staples in people’s day-to-day lives. The introduction of high-powered cameras to most modern smartphones is what allowed these codes to gain new uses. QR codes,...
Blog

The 7 Most Dangerous Healthcare Cyber Attacks

While industries like banking and software can be devastated by cyber attacks, no other field is impacted by hackers like healthcare. As an example, it’s hard to forget attacks like the ransomware that brought all 400 locations of Universal Health Services to a standstill for months in the United States. Healthcare facilities often can’t operate if they don’t have access to...
Demo

Terranova Security and Microsoft

As Microsoft’s security awareness partner of choice, Terranova Security awareness content powers Attack Simulation Training, a key component of Microsoft Defender for Office 365. Learn more about the human-centric approach to security awareness training and content by booking a one-on-one demo. Your demo includes a complete overview of: Phishing, security awareness, social...
Blog

Law 25: Everything You Need To Know to Ensure Compliance

Online privacy and data protection have become pressing issues in recent years that many governments have decided to legislate. The Legault CAQ government has been behind many digital-related innovations, so it’s not surprising to see legislation like this. This law is a legislative update since existing laws inadequately address digital data. It should be noted that Law 25...
Blog

The Evolution and Limitations of Multi-Factor Authentication

As careers, banking, and healthcare move online, the need for more secure authentication has become increasingly urgent. While passwords have been adopted as the most common form of authentication, they pose many problems in terms of cyber security. In recent years, especially since the rise of remote work in 2019, the adoption of multi-factor authentication (MFA) has steadily...
Blog

Top 5 Data Security Incidents of 2023 and Predictions for 2024

As 2023 comes to an end, one thing is certain: cyber security is still a prime concern for most companies. While industries like healthcare and retail are still more heavily impacted than any other, a concerning trend has emerged in regard to the variety of organizations being targeted by cyber criminals. This variety accounted for a staggering 20% increase in data breaches...
Blog

What Organizations Can Learn from the Toyota Cloud Breach

Cloud storage has revolutionized how organizations collaborate internally, allowing them to store data conveniently and cheaper than ever. According to a recent survey of technology leaders, 93% of respondents said their company was “mostly cloud,” reflecting the hold that this technology has on all industries. The auto industry has recently integrated cloud storage at all...
Blog

Updated FCC Legislation Could Mean New Data Privacy Requirements for Telecoms

Telecommunications companies (telecoms) have been prime targets for cyber attackers. They operate critical infrastructure passage, and vast amounts of customer data pass through their networks. The United States Federal Communications Commission (FCC) is aiming to strengthen data security with new regulations around data breach reporting by communications carriers. The agency...
Blog

Why Transparency After a Data Breach is Important

It’s one of the scariest outcomes of a cyber attack. A data breach’s effect can easily bankrupt a company, and even if appropriately handled, its consequences are often felt for months or years to come. One of the biggest issues with data breaches, and what is often the most damaging outcome, is the loss of trust from customers. After all, if a breach happened once, how do you...
Blog

How to Report a Phishing Email Scam: What You Need to Know

Over 3.4 billion phishing emails are sent out to unsuspecting recipients daily. At this rate, over 1 trillion email scams are deployed in one calendar year. The sheer enormity of these numbers makes it easier to understand how and why employees become victims of phishing email scams. Their typical email inbox is overflowing with emails from colleagues, partners, friends,...
Blog

Android vs iOS: Which Operating System is Safer?

Cellphones have seen one of the most dramatic technological growths of any hardware in recent history. From simple portable phones a few decades ago, they’ve become fully-fledged computers with their own OS and applications used daily by most people worldwide. Smartphones have become such a fixture of life, and hackers and scammers have been working to exploit these devices...
Blog

Wi-Fi Pineapple: What Do You Know About this Cyber Security Threat?

Carrying out a cyber attack is becoming more and more accessible. For a meager price of $99, anyone can now buy a platform to steal personal data and pose a cyber threat to organizations worldwide. This accessibility is made possible through the Wi-Fi Pineapple. Learn about this new cyber threat in this article and get tips on protecting your organization. What is a Wi-Fi...
Blog

How Scammers Are Using ChatGPT to Steal Credentials

Since its release, ChatGPT has been a hot topic, with more and more people growing to like it. Among the people who are enjoying the advantages of this AI tool are online scammers. Hackers use ChatGPT's popularity to trick users into downloading malware and stealing their personal information, making it a hotbed for phishing scams. Luckily, users can avoid falling prey to...
Blog

What's the Damage? The Truth About the Cost of Data Breaches

In today's interconnected world, organizations are responsible for their cyber security practices as well as those of their third-party vendors. With increasingly complex risk management scenarios, the impact of a data breach can be catastrophic for an entire supply chain. According to a study by IBM, 83% of U.S. companies who participated have experienced a data breach more...